An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)

From MaRDI portal
Revision as of 17:30, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4250756

DOI10.1007/3-540-48910-X_7zbMath0948.94008OpenAlexW1805062869MaRDI QIDQ4250756

Shafi Goldwasser, Ran Canetti

Publication date: 5 October 1999

Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-48910-x_7




Related Items

Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistencyGeneric Construction of Chosen Ciphertext Secure Proxy Re-EncryptionAdaptively secure distributed PRFs from LWEBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesAdaptively secure threshold symmetric-key encryptionDynamic Threshold Public-Key Encryption with Decryption Consistency from Static AssumptionsElectronic jury voting protocolsRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelThreshold public key encryption scheme resilient against continual leakage without random oraclesCCA2-Secure Threshold Broadcast Encryption with Shorter CiphertextsEncapsulated search index: public-key, sub-linear, distributed, and delegatableChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextEfficient dynamic threshold identity-based encryption with constant-size ciphertextFuzzy asymmetric password-authenticated key exchangeAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsProvably secure threshold public-key encryption with adaptive security and short ciphertextsComputational fuzzy extractorsSimplified Submission of Inputs to ProtocolsA note on the security of KHL schemeThe reactive simulatability (RSIM) framework for asynchronous systemsAdaptively Secure Non-interactive Threshold CryptosystemsVerifiable Elections That Scale for FreeTag-KEM/DEM: A new framework for hybrid encryptionEfficient hybrid encryption from ID-based encryptionEfficient chosen-ciphertext secure certificateless threshold key encapsulation mechanismProtecting against key-exposure: strongly key-insulated encryption with optimal thresholdExtensions of access structures and their cryptographic applicationsFair Traceable Multi-Group SignaturesAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsEfficient Threshold Encryption from Lossy Trapdoor FunctionsChosen-Ciphertext Secure Proxy Re-encryption without PairingsAdaptively secure distributed public-key systems.Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts